Chinese character string encryption and decryption method
A technology of Chinese characters and encryption methods, applied in the field of information security, can solve problems such as difficult writing or identification, poor readability and reproducibility of ciphertext, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0161] According to the encryption method of a kind of Chinese character string in the above-mentioned specific embodiment, the steps are as follows:
[0162] (1)将某段中文字符串“一种中文字符串的加密和解密方法,简单实用。”逐个字符转换成数值型数据,得到高位数值序列P1={210,214,214,206,215,183,180,181,188,195,186,189,195,183,183,163,188,181,202,211,161}和低位数值序列P2={187,214,208,196,214,251,174,196,211,220,205,226,220,189,168,172,242,165,181,195,163 }, wherein the length of the numerical sequence P1, P2 is consistent with the length of the string, which is recorded as L=21;
[0163] (2) First use the external encryption key (α=0.12345, β=23.45), let the initial value x 1 =α and parameter μ=β, according to formula x in the encryption method step (2) of a kind of Chinese character string in the above-mentioned specific embodiment k+1 =cos(μ arccos(x k )) Iterates the Chebyshev chaotic system shown in , and obtains the chaotic sequence X, and extracts the element x from the chaotic sequence X 300 =-0.925809812983847, as the formula y...
Embodiment 2
[0175] According to the above-mentioned encryption method of a Chinese character string, a certain section of the Chinese character string to be encrypted is "a method for encrypting and decrypting a Chinese character string, which is simple and practical." The encryption steps are similar to the specific embodiment 1, only the encryption key Minor changes occur: α = 0.12345000000001; or β = 23.45000000000001; or C1 22 = 20; or C2 0 =13, the Chinese character string encryption results are shown in Table 1. It can be seen from Table 1 that a slight change in the encryption key will cause a large change in the encrypted ciphertext of the Chinese character string, so it can be seen that the encryption method for the Chinese character string proposed in this patent is sensitive to the encryption key.
[0176] Table 1 When the external encryption key changes slightly, the Chinese character string encryption result
[0177]
Embodiment 3
[0179] According to the above-mentioned encryption method of a Chinese character string, its encryption steps are similar to those in Embodiment 1, and only a certain section of the Chinese character string to be encrypted ("a method for encrypting and decrypting a Chinese character string is simple and practical.") undergoes slight changes. : "Two kinds of encryption and decryption methods for Chinese character strings, which are simple and practical."; or "A method for encryption and decryption of Chinese substrings, which is simple and practical."; or "A method for encrypting and decrypting Chinese character strings , simple and practical.”; or “A method for encrypting and decrypting Chinese character strings, which is simple and practical.”; or “A method for encrypting and decrypting Chinese character strings, which is simple and practical.”; or “A method for encrypting and decrypting Chinese character strings, which is simple and practical.”; Encryption and decryption meth...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com